This website uses cookies. By clicking Accept, you consent to the use of cookies. Click Here to learn more about how we use cookies.
Accept
Reject
  • RSA.com
  • Home
  • Advisories
    • SecurID
    • SecurID Governance & Lifecycle
  • Documentation
    • SecurID
      • Authentication Agents
        • API / SDK
        • Apache Web Server
        • Citrix StoreFront
        • IIS Web Server
        • MFA Agent for macOS
        • MFA Agent for Windows
        • Microsoft AD FS
        • Microsoft Windows
        • PAM
      • Authentication Engine
      • Authentication Manager
      • Cloud Authentication Service
      • Hardware Appliance
        Component Updates
      • Hardware Tokens
      • Integrations
      • SecurID App
      • SecurID Authenticator for macOS
      • SecurID SDK
      • Software Tokens
        • Android
        • iOS
        • macOS
        • Token Converter
        • Windows
    • SecurID Governance & Lifecycle
    • Technology Partners
  • Downloads
    • SecurID
      • Authentication Agents
        • API / SDK
        • Apache Web Server
        • Citrix StoreFront
        • IIS Web Server
        • MFA Agent for macOS
        • MFA Agent for Windows
        • Microsoft AD FS
        • Microsoft Windows
        • PAM
      • Authentication Engine
      • Authentication Manager
      • Cloud Authentication Service
      • Hardware Appliance
        Component Updates
      • Hardware Tokens
      • Integrations
      • SecurID Authenticator for macOS
      • Software Tokens
        • Android
        • iOS
        • macOS
        • Token Converter
        • Windows
    • SecurID Governance & Lifecycle
  • Community
    • SecurID
      • Blog
      • Discussions
      • Events
      • Idea Exchange
      • Knowledge Base
    • SecurID Governance & Lifecycle
      • Blog
      • Discussions
      • Events
      • Idea Exchange
      • Knowledge Base
  • Support
    • Case Portal
      • Create New Case
      • View My Cases
      • View My Team's Cases
    • Community Support
      • Getting Started
      • News & Announcements
      • Ideas & Suggestions
      • Community Support Articles
      • Community Support Forum
    • Product Life Cycle
    • Support Information
    • General Security Advisories
  • Education
    • Blog
    • Browse Courses
      • SecurID
      • SecurID Governance & Lifecycle
    • Certification Program
    • New Product Readiness
    • Student Resources
Sign In Register Now
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Search instead for 
Did you mean: 

SecurID® Governance & Lifecycle Knowledge Base

Find answers to your questions and identify resolutions for known issues with knowledge base articles written by SecurID Governance & Lifecycle experts.
  • SecurID Community
  • :
  • Products
  • :
  • SecurID Governance & Lifecycle
  • :
  • Knowledge Base
  • :
  • 'customizeACM.sh -d' fails with 'Undeploy failed:' error in RSA Identity Governance & Lifecycle
  • Options
    • Subscribe to RSS Feed
    • Bookmark
    • Subscribe
    • Email to a Friend
    • Printer Friendly Page
    • Report Inappropriate Content

'customizeACM.sh -d' fails with 'Undeploy failed:' error in RSA Identity Governance & Lifecycle

Article Number

000038362

Applies To

RSA Product Set: RSA Identity Governance & Lifecycle
RSA Version/Condition: 7.0.x, 7.1.x, 7.2.x
 

Issue

Running customizeACM.sh -d on a standalone server in RSA Identity Governance & Lifecycle  fails with:
 
Creating aveksa.ear file for deployment
      [zip] Building zip: /tmp/customizeACM/aveksa.war
      [zip] Building zip: /tmp/customizeACM/aveksa.ear
     [copy] Copying 1 file to /home/oracle/archive

Undeploying current ear...
Undeploy failed: {"WFLYCTL0062: Composite operation failed and was rolled back. Steps that failed:" => 
{"Operation step-1" => "WFLYCTL0216: Management resource '[(\"deployment\" => \"aveksa.ear\")]' not found"}}

Deploying new customized ear...    this may take a while...
Exception encountered while deploying Aveksa.ear
{"WFLYCTL0062: Composite operation failed and was rolled back. Steps that failed:" => 
{"Operation step-2" => {"WFLYCTL0080: Failed services" => {"jboss.deployment.unit.\"aveksa.ear\".CONFIGURE_MODULE" => 
"org.jboss.msc.service.StartException in service jboss.deployment.unit.\"aveksa.ear\".CONFIGURE_MODULE: 
WFLYSRV0153: Failed to process phase CONFIGURE_MODULE of deployment \"aveksa.ear\"
    Caused by: org.jboss.msc.service.DuplicateServiceException: 
Service jboss.module.spec.service.\"deployment.jboss-logging-3.3\".main is already registered"},
"WFLYCTL0412: Required services that are not installed:" => ["jboss.deployment.unit.\"aveksa.ear\".CONFIGURE_MODULE"],
"WFLYCTL0180: Services with missing/unavailable dependencies" => undefined}}}


Aveksa.ear deployment failed after 1 minutes, 45.208 seconds

Updating CURRENTLY_DEPLOYED_ARCHIVE to aveksa_7.1.1_161195_P04-2020-Jan-20-9.31.ear

aveksa_7.1.1_161195_P04-2020-Jan-20-9.31.ear archived

An error occured in the customizeACM command : error code 5

If you encounter this error installing an RSA Identity Governance & Lifecycle patch, please see related RSA Knowledge Base Article 000038350 -- Patch/upgrade fails with 'Error deploying the ear file' error in RSA Identity Governance & Lifecycle for resolution.
 

Cause

The key error here is:
 
{"Operation step-1" => "WFLYCTL0216: Management resource '[(\"deployment\" => \"aveksa.ear\")]' not found"}}
 
The aveksa.ear file cannot be found. The reason for this error is that the deployed aveksa ear file has a filename other than aveksa.ear.

By default, the RSA Identity Governance & Lifecycle installation, patch/upgrade and customizeACM.sh processes automatically deploy the ear file with the name aveksa.ear and expect the name of the ear file to be aveksa.ear when they go to undeploy the ear.

In cases where the ear file has been deployed manually, it is possible to deploy the ear file with a name other than aveksa.ear. In this case future patching, upgrading and customization of the ear file will fail. 
 

Resolution

Redeploy the current ear file as aveksa.ear and re-run customizeACM.sh.

  1. Login as the oracle user
  2. Determine the name of the currently deployed ear file:
$AVEKSA_HOME/wildfly/bin/jboss-cli.sh -c --controller="127.0.0.1:9999" --command="deployment-info"
You will see output similar to the following:
NAME                                          RUNTIME-NAME                                  PERSISTENT ENABLED STATUS
aveksaWFArchitect.ear                         aveksaWFArchitect.ear                         true       true    OK
<name other than aveksa.ear>                  <name other than aveksa.ear>             true       true    OK
​​​​​This is the reason for the failure. The name should be aveksa.ear.
  1. Undeploy the ear file.
$AVEKSA_HOME/wildfly/bin/jboss-cli.sh -c --controller="127.0.0.1:9999" --command="undeploy <name of deployed aveksa ear file>"
  1. Deploy the same ear file as aveksa.ear.
$AVEKSA_HOME/wildfly/bin/jboss-cli.sh -c --controller="127.0.0.1:9999" --command="deploy $AVEKSA_HOME/archive/<name of aveksa ear file to be deployed>
--name=aveksa.ear --runtime-name=aveksa.ear"
  1. Check that the aveksa.ear file deployed correctly.
NAME                   RUNTIME-NAME          PERSISTENT ENABLED STATUS
aveksaWFArchitect.ear aveksaWFArchitect.ear  true       true    OK
aveksa.ear            aveksa.ear             true       true    OK
Now the current ear file is deployed with the name aveksa.ear so customizeACM.sh will be able to find and undeploy the current ear file.
  1. Run customizeACM.sh again.
cd $AVEKSA_HOME/deploy
./customizeACM.sh -c
  1. Make customizations and then deploy the new customized ear file:
./customizeACM.sh -d
 

To avoid the problem in the future:

If you are deploying the ear file manually and not through patching, upgrading or customizeACM.sh, ensure that the ear file is deployed as aveksa.ear by following the instructions in RSA Knowledge Base Article 000038351 -- How to manually deploy an aveksa ear file in RSA Identity Governance & Lifecycle.
 

Notes



 
Tags (67)
  • 7
  • 7.0
  • 7.0.x
  • 7.1
  • 7.1.x
  • 7.2
  • 7.2.x
  • 7.x
  • Aveksa
  • Break Fix
  • Break Fix Issue
  • Broken
  • Community
  • Community Issue
  • Config
  • Configuration
  • Configuration Help
  • Configuration Issue
  • Configuration Problem
  • Configuring Issue
  • Configuring Problem
  • Customer Support Article
  • Identity
  • Identity G&L
  • Identity Governance & Lifecycle
  • Identity Governance and Lifecycle
  • IG&L
  • IGL
  • Install
  • Install Error
  • Install Issue
  • Installation
  • Installation & Upgrade
  • Installation Issue
  • Issue
  • Issue Configuring
  • Issues
  • Jive
  • Jive Issue
  • KB Article
  • Knowledge Article
  • Knowledge Base
  • Link Issue
  • Problem
  • RSA Identity
  • RSA Identity G&L
  • RSA Identity Governance & Lifecycle
  • RSA Identity Governance and Lifecycle
  • RSA Link
  • RSA Link Issue
  • Setup Issue
  • Support Portal
  • Upgrade
  • Upgrade Error
  • Upgrade Issue
  • Upgrade Problem
  • Upgrades
  • Upgrading
  • Version 7
  • Version 7.0
  • Version 7.0.x
  • Version 7.1
  • Version 7.1.x
  • Version 7.2
  • Version 7.2.x
  • Version 7.x
  • Website Issue
0 Likes
Was this article helpful? Yes No
Share
No ratings

In this article

Version history
Last update:
‎2020-12-12 11:15 AM
Updated by:
Administrator RSA-KB-Sync Administrator

Related Content

Powered by Khoros
  • Blog
  • Events
  • Discussions
  • Idea Exchange
  • Knowledge Base
  • Case Portal
  • Community Support
  • Product Life Cycle
  • Support Information
  • Customer Success
  • About the Community
  • Terms & Conditions
  • Privacy Statement
  • Provide Feedback
  • Employee Login
© 2022 RSA Security LLC or its affiliates. All rights reserved.